Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 278 of 531

Employee – CEO pay gap historically wide

Proposed fixes: caps, taxation, and worker power

  • Some want hard legal limits on CEO pay relative to lowest worker pay or “Jack and Jill” averages, or very high marginal tax rates (e.g., 90%) to discourage extreme packages.
  • Pushback: high rates invite loopholes, offshoring, and personal relocation; incentives for “top talent” and high earners could be damaged.
  • Others argue the focus should be on strengthening labor: more unions, guilds, and collective action (including strikes) over issues like RTO mandates, surprise layoffs, weakened benefits, and AI deployment.
  • Skeptics note workers’ fear of losing jobs, high cost of living, health insurance tied to employment, and visa dependence all undermine strike leverage.

Power structures: technofeudalism, oligarchy, and antitrust

  • Several frame the situation as “oligarchy” or “technofeudalism,” where a small elite owns assets and rents everything to everyone else (including software/LLMs).
  • There is debate over whether tech workers are “lords” or just skilled blacksmiths still at the mercy of corporate “lords.”
  • Some call for aggressive antitrust action and breakup of large tech firms to restore competition and bargaining power.

CEO pay: value, risk, and fairness

  • One camp argues huge CEO pay can be rational if markets expect strong performance (e.g., citing a CEO hire that coincided with a large stock jump), and that compensation aligns with legal, strategic, and reputational risk.
  • Critics respond that many CEOs face little real downside—golden parachutes, rapid re‑hiring, and minimal legal consequences—while workers live paycheck to paycheck. “Risk” is seen as overstated.
  • Others question the moral and political power concentration; even if cutting CEO pay doesn’t massively raise wages, they still see high pay as corrosive.

Metrics and narratives

  • Multiple commenters challenge the headline and commonly cited ratios: the S&P 500 CEO-to-worker gap is up year over year but below a recent peak; comparing top 500 CEOs to all workers (or to all CEOs) is called misleading.
  • Wage-only comparisons exclude equity, which dominates executive compensation, but worker total compensation and tax progressivity are also contested.
  • Some see the CEO–worker ratio as emotional “agitprop”; others see it as a useful signal of extreme inequality even if it’s an imperfect statistic.

Broader structural factors

  • Suggested contributors include weak antitrust, policy choices like performance-based pay tax rules, offshoring and China trade integration, and immigration regimes (e.g., H‑1B) allegedly used to depress wages.
  • There is disagreement over which of these are primary drivers and how much any single law or court case (e.g., shareholder primacy doctrines) really explains today’s pay gaps.

CARA – High precision robot dog using rope

Overall Reception and Presentation

  • Commenters are highly impressed by both the engineering and the clarity of the video; many call it a “masterclass” in DIY robotics and communication.
  • The cinematography and structured explanation (problem → design → testing → iteration) are praised as unusually good for YouTube.
  • Several people express personal motivation and even “jealousy in a good way” about the quality of the portfolio.

Capstan Rope Drive, Materials, and Wear

  • The capstan drive is lauded for high torque, speed, compliance, and essentially zero backlash compared to gears.
  • Dyneema/UHMWPE rope is highlighted as a “game changer”: very strong, light, low stretch; compared favorably to steel cables (lighter, less fatigue, easier handling) but more heat-sensitive than Kevlar or steel.
  • There is curiosity and skepticism about long‑term fatigue and wear; others point to the creator’s earlier multi‑week endurance test with low backlash drift.

Precision, Gear Ratios, and Kinematics

  • Debate over why an “exact” 8:1 ratio matters:
    • One side: extra digits don’t inherently mean more precision.
    • Other side: knowing the exact ratio is crucial for inverse kinematics, easier debugging, and repeatability.
  • Simple, “clean” ratios help verify behavior by counting rotations and aligning marks.

Control Algorithms and Discovery Algorithms

  • The robot reportedly uses relatively simple gait/control algorithms (e.g., cycloid-based timing), making the performance more impressive and leaving room for future RL/optimization.
  • A long sub‑thread critiques YouTube’s discovery and search algorithms—over‑fitting to recent views, poor handling of near‑exact search terms, and difficulty discovering older “goldmine” channels—despite evidence that very niche robotics videos do sometimes get surfaced.

Ethics, Dread, and Future Warfare

  • Some express dread: advances that make hobby robot dogs possible also lower the cost of semi‑autonomous weapons and “borderless warfare.”
  • Others argue autonomous weapons might eventually reduce human casualties or that fears are overblown; strong disagreement follows, with discussion of Ukraine, Gaza, nuclear deterrence, and cartel use of drones.

DIY Robotics and How to Start

  • Multiple commenters feel this is a “golden age of DIY engineering” thanks to cheap 3D printers, electronics, and online instruction.
  • Suggested starting points for newcomers: Arduino, hobby servos, small robot kits, plotter‑style arms like Brachiograph, and tutorials from hobby electronics sites.

Creator Careers and Platforms

  • There’s debate on whether a highly capable builder should:
    • Stay independent with YouTube, sponsorships, and possibly a startup;
    • Or join an established R&D team to avoid business overhead.
  • Monetary viability is seen as mixed: some creators do very well, others earn less than equivalent corporate engineering roles but value autonomy and reduced corporate stress.

YouTube AI Translation and UX Issues

  • Several people encounter an unwanted auto‑dubbed AI translation track (e.g., German) on the embedded video, calling it jarring and misleading.
  • Explanation: YouTube has begun auto‑adding AI voice translations by default; viewers can manually switch audio tracks, and uploaders must explicitly opt out per video.
  • At least one user references a browser extension to disable these auto‑translations.

Power, Applications, and Comparisons

  • Commenters speculate about power consumption and duty cycle of such robots, comparing them to MIT’s Cheetah and Boston Dynamics dogs; rough figures from prior research suggest ~30 minutes of intense running on a sizable battery.
  • Some brainstorm alternate applications for capstan drives, such as telescope mounts, or improving rolling‑contact geometries for long‑distance legged locomotion.
  • Reactions to “robot dogs” themselves are mixed: some are excited for future personal/security use, others find the idea unsettling or undesirable.

The Promised LAN

Nature and goals of TPL

  • Described as a “virtual permanent LAN party” for a small, tightly knit group, more akin to building a mini-Internet than a gaming VPN.
  • Built to recreate a pre-algorithmic, non-commercial, “small internet” for friends: IRC, SIP “red phones”, LAN-only email, NAS swaps, thermal printers, and other odd services.
  • The linked manifesto is widely praised as the best explanation and an inspiration to build similar networks, not an invitation to join this one.

Membership, privacy, and social dynamics

  • Membership is explicitly closed and based on long-standing offline relationships and trust; not intended as a public community or recruitment vehicle.
  • Some see this as a “no girls allowed treehouse” vibe or exclusionary; others argue it’s healthy and normal for close-knit groups to have private spaces.
  • The project is framed as a model for others to copy with their own friend groups.

Technical architecture & protocol choices

  • Built as an L3 overlay: multiple independently run backbone nodes (Debian/strongSwan, OpenBSD/iked) peered with IPSec and BGP, forming a small routed network.
  • IPSec is defended as “industry standard,” well-understood by many, and supported natively on mainstream OSes; critics call it tricky and wish for WireGuard.
  • Discussion notes that L2 behavior (for legacy/IPX games, broadcast discovery) is easier via L2TP/IPsec or GRE, but TPL appears to be mostly L3.
  • Some are disappointed by IPv4-only and lack of WireGuard; others say the tech stack matches the operators’ backgrounds and the “fun of doing it the hard way.”

Alternatives and “just use X”

  • Tailscale/Headscale, WireGuard meshes, SoftEther, ZeroTier are raised as simpler ways to achieve similar connectivity.
  • Supporters counter that the “custom jiggery pokery” is the point: the network itself is the hobby and a way to deepen real-world networking skills.

Use cases: gaming vs socializing

  • Multiple commenters assume it’s for video games and are frustrated the site doesn’t list what’s played.
  • Insiders clarify that few or no games are played; it’s mostly socializing, IRC, weird services, and hardware tinkering. The network is the toy.

Security, trust, and exposure

  • Some members fully expose home LANs; others isolate via VLANs and limited segments.
  • Security concern: malware from one household potentially spreading across the shared network.
  • Defenders argue the model depends on strong social trust and norms that don’t scale to “everyone on the internet,” which is deliberate.

LAN vs WAN semantics and nostalgia

  • Debate over whether this is really a LAN (single broadcast domain) or a WAN/VPN; many say “LAN party” now reasonably includes virtual LANs.
  • Long subthread of nostalgia for 90s/00s in-person LAN parties, CRT hauling, IPX/SPX, BNC cabling, and school/office lab game hijinks.

Broader reflections

  • Some call it “reinventing the internet” or a gimmick that doesn’t fix reliance on the public web for content and communication.
  • Others see it as a concrete, joyful answer to dissatisfaction with today’s ad-driven, AI-laden Internet: small, trusted, self-run networks among friends.

You can now disable all AI features in Zed

AI control & philosophy

  • Strong approval for a single setting to disable all AI; many see this as “respecting the developer” and necessary for interviews, focus, or moral/privacy reasons.
  • Some prefer AI to remain decoupled (separate tools or terminals) rather than tightly embedded in the editor.
  • Others still want finer-grained control: enum-style modes, feature-by-feature toggles, or “disable_llm but keep classic autocomplete.”
  • A few note that Zed’s AI has always been optional via scattered settings; this new flag mainly centralizes control.
  • Naming disable_ai: false draws criticism as a confusing double negative; some argue for enable_ai: true, others say “disable” better conveys that everything is off.

AI feature quality & competition

  • Multiple users feel Zed’s AI is lagging Cursor and Copilot, especially in tab completion; Cursor’s context-aware completions are described as “mind-reading.”
  • Agent/chat mode in Zed is seen as decent but behind “background agents” workflows (e.g., offloading small maintenance tasks, upgrades, and fixes).
  • Some are happy with Zed’s agent and overall UX and are willing to accept weaker autocomplete to avoid VS Code–derived editors.

Core editor UX, performance & rendering

  • Zed’s speed and low input latency are widely praised, especially on macOS; several call it a spiritual successor to Sublime.
  • On Linux, experiences are mixed: some report worse latency and font rendering than VS Code; others say it’s fine but still early/“beta.”
  • GPU and battery usage can be high; turning off the minimap is a common workaround.
  • The multi-buffer/diff UI is polarizing: some call it Zed’s best innovation, others find it confusing and want single-file, full-context diffs. Tips: click line numbers, use Alt+Enter, enable double_click_in_multibuffer: "open".

Modal editing & configuration

  • Opinions on Vim mode diverge: some say it’s one of the best emulations they’ve used; others find it an “afterthought” vs Helix/Neovim.
  • No .vimrc import, but custom keybindings (e.g. mapping j k to Escape) are possible via JSON config.
  • Some users dislike the raw JSON settings with no GUI or commented skeleton.

Design, themes & ecosystem

  • Several users dislike Zed’s default themes and UI styling, calling them bland or low-contrast, especially autocomplete popovers.
  • Workarounds include porting VS Code themes, using community themes, or hand-rolling custom schemes.
  • Plugin/ecosystem gaps, Git log/diff limitations, weaker C# tooling, and less capable search/fuzzy navigation keep some on VS Code/JetBrains/Neovim.

Business model, trust & telemetry

  • Sustaining a free, open editor is a recurring concern. Users worry incentives will push toward “enshittification” via AI upsell or tracking.
  • Zed’s CLA and permissive-dependency policy are seen by some as positioning for future relicensing/enterprise builds.
  • Telemetry and the possibility of phoning home (even if disabled by a flag) make a few users uneasy; some suggest firewall rules in addition to config.

Neil Armstrong's customs form for moon rocks (2016)

Customs Forms and Space Travel

  • Many commenters see Armstrong’s customs form as a light-hearted stunt, confirmed by a NASA spokesperson in a linked article, while others emphasize that astronauts routinely file travel paperwork even when rules don’t strictly fit (e.g., ISS missions, trips via Baikonur).
  • Debate over why rules apply in edge cases:
    • Some argue it’s easier to follow existing procedures than carve out exceptions.
    • Others criticize “rules at all costs” as wasteful and absurd.
    • Mention that US regulations often contain broad carve-outs (“at the discretion of…”), so human judgment can be used.

Legal Status of Space and the Moon

  • Several comments frame the customs form in the context of the 1967 Outer Space Treaty: space and the Moon are “international” and not claimable as national territory.
  • Discussion compares space to:
    • International waters and US Navy ships (US jurisdiction follows the vessel).
    • Antarctica (as a “legal dead zone” model chosen for space governance).
  • Some suggest NASA wanted to stress the civilian, non-militarized nature of spaceflight by having astronauts go through normal customs.

Apollo Quarantine: Theater vs. Real Precaution

  • One branch argues Apollo quarantine and similar measures were mostly “publicity theater” or security theater.
  • Others push back:
    • Archival evidence (as summarized in linked articles) suggests NASA thought contamination risk was low but non-trivial and took it seriously.
    • The system had many gaps and bureaucratic silliness (e.g., lunar soil tested on “germ-free” mice; flawed indium seals; impractical glove boxes), but this is characterized as imperfect precaution, not purely for show.
  • A first-hand anecdote (from a lunar sample scientist’s notes) describes multiple agencies asserting jurisdiction, creating unnecessary constraints and failed technical approaches.

Borders, Passports, and Bureaucracy

  • Thread digresses into a long argument about historical borders and passports:
    • One view: modern passports restrict previously freer human movement and symbolize state control.
    • Counterview: borders and guarded crossings long predate modern passports; passports actually facilitate more predictable, safer movement than earlier arbitrary treatment at borders.
  • Multiple anecdotes about customs oddities (oil platform declared as one item, military/naval travel, accidental “invasions,” paratrooper reenactments) illustrate how rigid systems collide with unusual situations.

Astronauts, Insurance, and Human Angle

  • Discussion of “Apollo insurance covers” (autographed postal covers for families if astronauts died) prompts criticism that a country could send people to the Moon without fully securing their families’ financial future, though others note existing military/government survivor benefits.
  • A few comments highlight the charm of the original editor’s anecdote and the analog nature of forms, and one commenter expresses lingering doubt about modern capability to repeat Apollo, hinting at moon-landing skepticism.

US AI Action Plan

Geopolitics and AI “Race”

  • Many see the plan as formalizing a US–China AI arms race, with AI framed as national power and security.
  • Some argue China’s authoritarian system gives it an advantage in coordinated AI and infrastructure pushes; others reject the idea that the US should become more autocratic “to compete.”

Ideology, Free Speech, and “Woke AI”

  • Strong focus on “free speech” and “American values” is widely read as code for enforcing a particular political ideology.
  • A linked executive order on “preventing woke AI” explicitly bans concepts like unconscious bias, intersectionality, systemic racism, and “transgenderism” from federal models.
  • Commenters note this directly contradicts claims of neutrality and free speech, and predict models used by government will be forced to align with the ruling administration’s “truth.”

Open-Source / Open-Weight Models

  • Some welcome explicit support for open-source/open-weight models and see it as a counterweight to proposals to ban them.
  • Others call the language vague “vibe signaling” with no real funding or concrete support, and warn open weights are harder to monitor and can be repurposed for large-scale misinformation.
  • Debate over whether political neutrality is even possible; several argue all models inevitably embody human ideologies.

Energy and Climate Policy

  • The plan calls for “vast AI infrastructure” and more “dispatchable” power, while rejecting “radical climate dogma” and barely mentioning renewables.
  • Many expect this will mean deregulation for fossil fuels and delayed solar/wind buildout, despite nuclear restarts being highlighted.
  • Long subthread on solar vs nuclear costs, land use, water use, and storage; no consensus, but broad concern that clean energy strategy is being subordinated to short‑term politics.

Healthcare and “Try-First” Culture

  • The push for a “try-first” AI culture in sectors like healthcare alarms many, given existing safety and liability regimes.
  • People predict aggressive AI deployment for billing and claim denials rather than patient care, reinforcing already dystopian incentives.
  • A minority points to early research where AI can outperform doctors on some diagnostic tasks, but most insist this is not ready for unregulated rollout.

Legal System and Synthetic Media

  • The “Combat Synthetic Media in the Legal System” pillar is read as mainly about deepfake evidence and watermarking standards.
  • Commenters note tension between promoting generative models everywhere and trying to keep AI-generated media out of courts.

Implementation, Capture, and Competence

  • Widespread skepticism that the government has the state capacity or talent to execute beyond speeches and large contracts.
  • Expectation that major winners will be entrenched contractors and big AI vendors (Palantir, cloud giants), not the public.
  • Several view the Trump-heavy branding and personality‑cult aesthetics of the site as a preview of how “AI alignment” will be politicized.

Missing Pieces and Broader Fears

  • Notably absent: serious treatment of workforce displacement, social impacts, or making skilled immigration easier.
  • Some foresee AI being used primarily as a propaganda and control tool; a few call for global bans on AGI development, but acknowledge that this view is now marginal.

Building better AI tools

Pace, incentives, and organizational reality

  • Several comments doubt industry will “slow down” or prioritize learning-first workflows in competitive corporate contexts.
  • Committees and shared responsibility are seen as blocking bold rethinks of tooling; people fear “rocking the boat.”
  • Others argue Innovator’s Dilemma and organizational incentives, not lack of creativity, are what really block change.

Interfaces: chatbots vs “intelligent workspaces”

  • Many want richer, tool-heavy “intelligent workspaces” instead of raw chatbots: environments tightly integrated with logs, code, infra, and explicit controls.
  • It’s acknowledged this is harder and costlier than “AI in a textbox,” so vendors skew toward selling to management vs building better UX.
  • Team-context sharing between coding agents (Claude Code, Cursor, etc.) is desired, but concerns arise about loss of control over context and potential for abuse or miscoordination.

Human-in-the-loop vs autonomous agents (especially in ops)

  • Strong debate over how far incident-response agents should go:
    • One side: AI should mostly suggest, not act, due to non-determinism, safety, and the need for humans to practice diagnostic skills.
    • Other side: many investigative steps (log queries, state dumps, anomaly detection) are low-risk and computers are inherently better at them; blocking automation there “wastes time.”
  • Broad agreement that unsupervised destructive actions (e.g., Terraform apply, dropping data, DB wipes) are unacceptable today.

Skills, learning, and “deskilling”

  • Many worry AI coding erodes deep fluency, like GPS eroding navigation or calculators eroding arithmetic; practice (“paint-the-fence”) is seen as key for design skill and mental models.
  • Others counter that higher-level thinking is the real bottleneck; code can become an “implementation detail” if reviewed well.
  • Some report AI actually deepens learning via debugging its flawed output or using it for scaffolding while still reasoning through designs.
  • Parallel debate over creativity: is AI a “bicycle for the mind” or a “credit card for the mind” that eventually presents a cognitive bill?

Designing better AI tooling

  • Many resonate with starting from architecture, specs, and tests, then delegating implementation to AI; AI works best with clear structure, types, and docs.
  • Preference for HITL tools that guide, question, and nudge (Clippy-like) over “magic wand” agents that spit out final answers.
  • Some highlight that current models already support this via careful system prompts; the real gap is product design philosophy, not raw capability.

Proxmox Donates €10k to the Perl and Raku Foundation

Size and significance of the €10k donation

  • Some feel €10k is small given Perl’s centrality to Proxmox, but others argue it’s far more than most companies using open source ever give back.
  • A commenter notes this sum is roughly a quarter of the Perl/Raku Foundation’s yearly revenue, which is both worrying (low overall funding) and encouraging (Proxmox’s impact is real).
  • Others emphasize that Proxmox is not a giant cash-printing enterprise and that its success relies on much more than Perl alone, making the donation proportionate.
  • The Foundation explicitly wants more sponsors in this range instead of depending on rare six‑figure donors; publicizing Proxmox’s gift is seen as a way to attract peers.

Proxmox’s tech stack and value-add

  • Proxmox is heavily based on Perl (plus HTML/JS and some Rust), atop QEMU/KVM and other free software.
  • Debate over whether Proxmox is “just a UX wrapper around QEMU”: several replies push back, citing clustering, SDN, Ceph integration, containers, backups, REST APIs, RBAC, and long-term upgrade paths as substantial engineering beyond a thin UI.
  • It’s popular in homelabs due to ease of use and being fully FOSS, but also reportedly used in sizable VMware replacement deployments.
  • Users praise its value for small businesses and labs, especially ease of managing ZFS and “pet” VMs.

Perl’s current status and use in new projects

  • Multiple participants confirm Perl 5 is actively maintained with recent releases and strong backward compatibility; very old code still typically runs.
  • There’s extended discussion of how rare language-level breaking changes are, with hash key ordering randomness cited as a notable but documented shift.
  • Some organizations continue to write greenfield backends in Perl, citing:
    • Cross‑platform reliability.
    • Strong text/file processing, especially with regex.
    • CPAN’s breadth.
    • Fast development and execution and low churn over decades.
  • Others consider choosing Perl for new systems a red flag and prefer Python or other languages; many “Perl shops” now use a second backend language.

Raku / “Perl 6” debate

  • Confusion persists around Perl 6: some call it a huge breaking change; others stress it was always a separate redesign and is now Raku.
  • Several lament that calling it “Perl 6” misled people into thinking Perl 5 was obsolete. Renaming to Raku is widely seen as the right move but late.
  • Raku is portrayed as niche but technically interesting (grammars, Unicode handling, lazy evaluation, hyper-operators), maintained by a small motivated team.

LLMs, idioms, and “one best way”

  • People report that modern LLMs can generate usable Perl, including with newer class syntax, though sometimes mixing in Moose/Raku concepts.
  • Some find Perl hard because of idioms and “there is more than one way to do it”; they wish for clearer “best practice” paths.
  • Others recommend resources like “Modern Perl” and “Perl Best Practices”, along with tools (perltidy, Perl::Critic) to standardize style and reduce choice overload.

Open-source funding and corporate culture

  • Multiple commenters describe failed attempts to direct budget surplus to OSS projects: managers see no precedent and balk at “paying for what we already have”.
  • Comparisons are drawn to individuals resisting paying for services they use heavily (e.g., YouTube Premium), and to microtransactions exploiting this psychology.
  • Suggestions include:
    • Framing donations as marketing/sponsorship (“brand awareness” at conferences) rather than altruism.
    • Emulating ESG-style reporting: a visible “we fund our open-source dependencies” section in annual reports.
    • Contributing code, QA, and bug reports when money isn’t feasible.
  • There’s broader frustration that it’s easier to raise millions for trendy products than thousands for foundational infrastructure like Perl or OpenSSL.

Regional and economic side-discussion

  • A tangent contrasts perceived frugality of many European tech companies (cheap hardware, cost-cutting culture) with higher spending norms at US firms; others partly confirm this but note structural differences (industry mix, margins, regulation, insolvency regimes).
  • Some push back on turning this into an anti‑EU narrative and point out that this particular donation story originates from a US-based foundation highlighting an Austrian company.

Community sentiment toward Perl and Proxmox

  • Several commenters express nostalgia and gratitude: Perl was foundational to their careers, and Proxmox delivers remarkable free value.
  • Others admit they assumed Perl was “dead” until this reminded them it’s still in active use and development.
  • A minority view calls further investment in Perl/Raku “beating a dead horse”, but this is countered with evidence of conferences, ongoing releases, and real-world deployments still generating significant revenue.

Uber will let women drivers and riders request to avoid being paired with men

Scope of the Feature & Fairness Debate

  • Central question: Why is same-sex matching offered only to women? Many argue equality means men should have the same option (e.g., men fearing false accusations from women passengers).
  • Others counter that this is “institutionalized discrimination” but justified by safety, not unlike allowing patients or massage clients to choose provider gender.
  • A faction insists discrimination is discrimination regardless of power dynamics; they argue that if this logic is accepted for sex, it would be unacceptable for race, so the standard is inconsistent.

Safety, Harassment, and Lived Experience

  • Numerous anecdotes of women being harassed, propositioned, stalked, or assaulted by male rideshare drivers; some are afraid to report or give low ratings because drivers know their home address.
  • Some note that background checks can only catch people with prior records; fundamentally it is “getting into a car with a stranger.”
  • A smaller thread highlights male fears of frivolous accusations, with some drivers installing cameras for self‑protection.

Segregation vs Integration

  • One side worries this normalizes gender segregation (analogies to separate bathrooms, women‑only train cars, some religious societies), arguing it may ultimately harm equality.
  • Others say optional women-only spaces are necessary for safety and comfort and don’t force anyone; they frame it as equity for a group already excluded by fear.
  • Debate over whether “safety for women” is an overused justification that can be abused to limit women’s freedom or trans inclusion.

Legal and Economic Questions

  • Unclear legality: tension with sex‑based discrimination rules in employment and public accommodation, complicated by Uber’s contractor model.
  • Comparisons made to women-only gyms, babysitter and doctor directories that allow gender filters, and “bona fide occupational qualification” carve‑outs.
  • Expected market effects: women choosing female drivers likely face higher prices or longer waits due to limited supply (often estimated far below 50%). Some foresee pressure to effectively pay women drivers more, raising discrimination concerns.

Alternatives and Longer-Term Fixes

  • Proposed alternatives: better vetting, more serious handling of complaints, mandatory or built‑in cameras, “safe and quiet” style filters, and ultimately self‑driving taxis.
  • Broader societal suggestions: reduce objectification of women, improve support for victims, and invest in education and cultural change rather than relying on segregation.

Why Elixir? Common misconceptions

Adoption, mindshare, and industry use

  • Many feel Elixir/BEAM is extremely well-suited to backend and “microservice-like” workloads, yet remains niche compared to Node/Java/Go.
  • Explanations offered: lack of marketing, resume-driven adoption, JS/TS hype cycle, organizational inertia, and language popularity being only weakly correlated with technical quality.
  • Some argue plenty of real systems run on Elixir (national data portals, banks, telecom, large chat platforms), but these deployments don’t get much visibility.
  • Others point out some early showcase companies have moved parts of their stack away, reinforcing perception risk.

Interop, ecosystem, and infra fit

  • Early DB tooling was perceived as Postgres-first and weaker for Oracle/SQLite, though others report Oracle and SQLite support are now workable.
  • Push to use BEAM primitives like ETS instead of Redis is seen by some as technically valid but “adoption-unfriendly” because it doesn’t align with common stacks.
  • Strong disagreement on Kubernetes fit: some say Elixir’s “do it all in one node/cluster” model clashes with ephemeral containers; others say Elixir works fine on k8s and is complementary if you understand both.
  • Concern that BEAM’s strengths (stateful processes, clustering, hot upgrades) are underused when Elixir is treated as “just another microservice.”

LiveView and frontend approaches

  • LiveView is praised for productivity and “no-JS” workflows, especially for internal/CRUD-style apps.
  • Critics argue it quietly turns a stateless web into a stateful, websocket-heavy system that’s fragile under crashes, deploys, or flaky connections, and that these tradeoffs are under-acknowledged.
  • Some prefer React/GraphQL or other frontends with Phoenix (Inertia, Vite, Channels); a few wish Phoenix embraced React more directly for consumer-grade UIs.

Erlang vs Elixir and learning path

  • Broad consensus: you can become highly productive in Elixir without learning Erlang first; Erlang knowledge is “nice to have” for deeper BEAM/OTP understanding, not a prerequisite.
  • Some prefer Erlang’s more “bare-metal” feel; others stress that processes, message passing, and behaviors are first-class in both and that they’re more like dialects than different languages.

Types, reliability, and “let it crash”

  • Lack of static typing is the single biggest hesitancy for many; others report years of productive use without it.
  • Supporters say pattern matching, guards, immutability, small set of core types, specs + Dialyzer, and strong test culture mitigate much of what people want from static types.
  • Opponents, especially in large codebases, say dynamic typing makes refactoring and onboarding harder; they miss compiler guarantees and precise tooling.
  • Ongoing work on gradual/set-theoretic types is noted, but several say it’s still far from TS/Go/Rust-level guarantees.
  • Long thread on “let it crash”:
    • Pro side: supervision trees and process isolation make crashes localized and auto-recoverable; better to optimize for recovery than attempt to preclude all failures.
    • Skeptical side: this doesn’t prevent logic/type bugs from reaching users; static typing and fault tolerance solve different problems and both can be valuable.

Developer experience, tooling, and docs

  • Many praise Elixir’s standard library consistency (especially around the pipe operator), OTP’s breadth, and exceptionally good, “how and why” style documentation.
  • The REPL, introspection into running systems, and BEAM observability are repeatedly called out as major quality-of-life wins.
  • VS Code LSP support (ElixirLS) exists and is actively used, though some still perceive the overall IDE story as weaker than mainstream typed languages.
  • Syntax divides people: control flow feels approachable to some, but pattern-matching/binary syntax and macros can look alien or intimidating.

Performance and where BEAM fits

  • BEAM is viewed as outstanding for IO-bound, highly concurrent, fault-tolerant systems, but not ideal for raw CPU-heavy workloads due to scheduling overhead and immutability costs.
  • Typical recommendation: keep performance hotspots in NIFs/ports or other languages, and orchestrate them from Elixir.
  • Some argue that AI/ML libraries like Nx/EXLA are impressive but lag far behind Python’s ecosystem and model coverage for practical ML/LLM work.

Alternatives: Gleam and others

  • Gleam frequently comes up as “Elixir + static typing”: BEAM-based, interops with Elixir/Erlang, and attractive to teams who like BEAM semantics but require static types.
  • Several commenters say they’d bet heavily on Gleam long term, or that their positive Elixir experience has made them look at Gleam.

Jobs and career calculus

  • Multiple people mention lack of Elixir job openings as a primary deterrent, even if they like the language technically.
  • This creates a chicken-and-egg problem: companies avoid Elixir due to perceived hiring pool risk; developers avoid it due to perceived job scarcity.

What to expect from Debian/Trixie

Upgrade & rollback concerns

  • Strong warning that Debian release upgrades (including to Trixie) are effectively one‑way: “system downgrade” is theoretically documented but practically fails and can leave systems unbootable.
  • Databases (MySQL/MariaDB) are highlighted as particularly irreversible because on‑disk formats are migrated.
  • Others counter that this has never been supported and Debian docs explicitly require full backups before release upgrades.
  • Several people suggest LVM, btrfs, or ZFS snapshots (and tools like Timeshift/Snapper or Mint’s snapshot rollbacks) as the realistic way to “revert”.
  • Comparisons with Windows/macOS rollback features; some feel Linux is behind here, others say imaging/snapshots cover the need if planned.

/tmp on tmpfs, swap, and memory behavior

  • New default of /tmp on tmpfs is controversial: critics worry a misbehaving program can easily exhaust RAM and destabilize the system, especially with large downloads.
  • Clarifications: default tmpfs is capped (typically ~50% of RAM per mount; newer systemd adds additional quotas). It won’t literally consume all memory, but multiple tmpfs mountpoints can still be problematic.
  • Advocates like the performance and SSD wear reduction for short‑lived temp files and note it’s easy to revert via tmp.mount or fstab.
  • Long, heated subthread on swap:
    • One camp: disable swap for better behavior under memory pressure and more effective OOM killing.
    • Other camp: a modest amount of swap greatly reduces I/O thrash and random OOM kills, especially on servers.
  • Trade‑offs around hibernation (requires swap), laptops vs servers, and kernel OOM behavior are heavily debated.

Network interface naming & systemd

  • Discovery that systemd has many evolving “predictable” naming schemes leads to frustration: interface names still change across upgrades, even in VMs.
  • Some administrators argue old MAC‑based naming (udev rules) was more stable; others note MACs aren’t always immutable and hardware replacement was a real problem.
  • Workarounds: pin net.ifnames=0 to keep eth0 style names; use .link files to set custom names; NamePolicy=keep discussed.
  • Critics see repeated churn and brittle behavior; defenders point to real enterprise bugs that motivated the change.

SSH, DNS, and other systemd‑integrated services

  • Reports that OpenSSH server is now socket‑activated under systemd on some installs; changing the port must be done in the socket unit, not just sshd_config. Some call this “madness” because SSH is the main admin lifeline.
  • Others say socket activation for sshd is longstanding Unix practice (inetd‑style) and offers benefits like smooth restarts and simpler dependencies.
  • systemd‑resolved + NetworkManager is described as fragile; some users lock /etc/resolv.conf with chattr +i to keep manual DNS.
  • Broader unease about systemd’s breadth and attack surface (referencing the xz/libsystemd incident); others stress individual systemd components can be disabled or replaced.

Packaging, filesystems, and distro comparisons

  • Multiple links to Debian packaging guides and policy; suggestion to use sponsorship/DD/DM process or pragmatic internal .deb approaches.
  • One commenter finds Debian’s native packaging tooling “far from sane” compared to RPM or BSD‑style ports; others ask if RPM‑based, btrfs‑friendly, LTS distros (openSUSE, Oracle Linux, Alpine) are better fits.
  • Discussion of btrfs support on various RHEL rebuilds and openSUSE flavors.

Experiences with Trixie/testing and advice

  • Many users report Trixie/testing as “boring and functional” on laptops, desktops, and even RISC‑V boards (with ZFS root), often for months.
  • Positive experiences with newer KDE/Plasma and Wayland, GNOME, sway gestures, updated Python (3.13), Podman/Quadlet, and current hardware enablement.
  • Caution: people who track testing (or stable) instead of codename (bookworm, trixie) get surprise major upgrades when releases flip. Strong advice: always pin by codename, especially for newcomers.
  • Some see Debian as extremely stable and ideal for “just works” servers; a minority report frequent breakage on Debian/Ubuntu vs Fedora and call Debian’s integration “hacky”.

Mail stack and service compatibility

  • Warning: Dovecot 2.4 in the new stable removes replication/director features and can break existing configs; some plan to stay on Bookworm or containerize Dovecot 2.3.
  • Concerns that Dovecot’s HA features are becoming commercial‑only; alternatives like Stalwart or third‑party replication tools are mentioned.

Miscellaneous Debian behavior & lifecycle comments

  • Noted long‑standing annoyances: su vs su - PATH behavior; Raspberry Pi firmware package interfering with backports kernel upgrades.
  • Some want better cloud‑native automation (Ignition/Butane‑like) rather than relying on cloud‑init/Ansible.
  • A few complain about constant churn in core stacks (GTK/Qt, firewalls, etc.) and wish an OS of this age changed less; others embrace the pace as acceptable given Debian’s stability focus.

Cops say criminals use a Google Pixel with GrapheneOS – I say that's freedom

Privacy, rights, and the “nothing to hide” trope

  • Many commenters reject the idea that only criminals need privacy; privacy is framed as a precondition for democracy, free speech, and healthy personal relationships.
  • “Nothing to hide” is criticized as both dishonest and dangerous: laws change, authorities can be corrupt, and you also hold other people’s private data (contacts, messages, photos).
  • Some argue it’s acceptable—and even healthy—for some “criminal” behavior to evade total enforcement, since many historically beneficial acts were once illegal.

Policing, profiling, and surveillance logic

  • Core worry: treating privacy-seeking (GrapheneOS, encrypted messaging) as inherent suspicion blurs the line between legitimate security work and mass surveillance.
  • People note that once surveillance infrastructure exists, it’s routinely abused, from petty vendettas to political repression; Snowden and Pegasus are cited as examples of systemic overreach.
  • Others counter that if, in a specific region, Pixel/GrapheneOS usage is heavily overrepresented among serious criminals, using that as one profiling signal is statistically rational—though still civil-liberties‑risky.

European policy and anti-privacy drift

  • Strong criticism of EU moves like “ChatControl” and broader anti-encryption trends; these are seen as backdoor mandates sold as child-protection but enabling cross-border political persecution.
  • Several comments describe mail-opening laws, drug-war justifications, and cooperation with US intelligence as evidence that privacy protections are being quietly dismantled.

Technology neutrality and “tools for criminals”

  • Recurrent analogy: banning or stigmatizing privacy tools (GrapheneOS, mixers, encryption) because criminals use them is like banning knives, fridges, or cash.
  • Debate around Roman Storm / Tornado Cash: some view it as a neutral privacy tool unfairly criminalized; others say operating a live mixing service is closer to active participation in money laundering.

GrapheneOS, hardware, and alternatives

  • Many users report positive experiences with GrapheneOS and see police hostility as validation that it meaningfully raises the bar for investigations.
  • Strong consensus that only Pixels currently meet GrapheneOS’ security requirements (secure element, update cadence, relockable bootloader without blowing fuses). Fairphone and similar devices are called “repairable but insecure” due to missing secure elements and slow patching.
  • Some are put off by GrapheneOS’ public relations style, describing the project as technically excellent but socially combative toward other privacy projects.

Trust, baseband, and “honeypot” worries

  • A minority argue that as long as the modem/baseband and firmware are closed, any mobile OS offers only partial protection; the stack ultimately serves vendors and possibly state actors.
  • Others respond that open source plus verifiable builds improve trust, even though you still trust builders unless you compile yourself.

Usability tradeoffs and ecosystem lock-in

  • Main practical downside repeatedly mentioned: no Google Pay / NFC payments (by design, due to SafetyNet/Play Integrity). Some banking apps and government attestation schemes also fail.
  • Sandboxed Google Play can be used for most apps, but SafetyNet‑dependent functionality remains an issue; users must weigh convenience vs. privacy.

Scope of the original “cops say” claim

  • Several point out the entire controversy traces back to a single offhand quote from one Spanish officer in one article, amplified through multiple tech news sites.
  • Some see this as overblown clickbait; others argue that even such small signals matter when they normalize equating privacy tools with criminality.

20 years of Linux on the Desktop (part 4)

GNOME 3, JavaScript, and Design Choices

  • Several comments criticize GNOME’s move to a JavaScript-heavy shell as slow and RAM‑hungry, though some note it’s now “usable” thanks to hardware and performance work.
  • Motive for JS is seen as making extension and shell development more approachable; some praise this, others say JS makes large apps buggier without strong typing.
  • One commenter disputes the article’s claim that patents drove GNOME 3’s direction, saying the design shift had roots in early GNOME 2 and wasn’t about patent FUD.

Fragmentation vs Unity

  • Debate over whether GNOME’s direction worsened fragmentation: some say fragmentation was already there (GNOME, KDE, tiling and niche WMs); others cite Wayland protocol disagreements (e.g., VR/DRM leasing) as evidence it’s now worse.
  • Many argue fragmentation is a feature: Linux attracts tinkerers, and multiple WMs/DEs are a natural, even healthy, outcome. Systemd is cited as one thing that did reduce fragmentation.

Market Share, Commercial Software, and Culture

  • One line of thought: Linux distros exist partly to escape market‑share logic; success is “good software I can use,” not conquering the desktop.
  • Counterpoint: market share matters so vendors bother to ship drivers and apps; people want access to the same tools as on Windows.
  • Linux culture is described as historically “entrepreneur‑hostile,” making paid native apps rare; SaaS sidesteps this by selling to users regardless of OS.
  • Industrial/engineering fields are locked into Windows‑only tooling; chicken‑and‑egg prevents Linux support even where users might otherwise switch.

GNOME 2 vs GNOME 3, Unity, and UI Controversies

  • Strong nostalgia for “just iterating on GNOME 2” instead of radical redesigns. Some still use MATE, Cinnamon, or XFCE for that reason.
  • GNOME 3 criticized for trend‑chasing (tablet/mobile‑like UI, hidden power‑off, dropped desktop icons, no system tray, no minimize/maximize, fullscreen launcher).
  • Others defend GNOME 3 (especially with Ubuntu’s dock / Dash‑to‑Dock) as the best desktop they’ve used: keyboard‑driven, simple for non‑technical users, good touch story on some hardware.
  • Extensions are both a strength (rich customization ecosystem) and a weakness (frequent breakage, unstable APIs, reliance on gjs/JS).

KDE, XFCE, and Alternatives

  • KDE is praised as the “pinnacle” of Linux desktops: highly configurable, visually polished, now lighter than GNOME for some, and steadily iterated rather than repeatedly broken.
  • Others find KDE visually noisy, oversized, or Windows‑like; some complain about “z‑index” glitches and over‑chromed apps like Konsole.
  • XFCE is the refuge for those tired of churn: minimal change over years, high stability, old plugins still work, “desktop is a solved problem.”
  • Niche WMs (i3, ratpoison, IceWM, tiling setups) are celebrated as part of Linux’s unique appeal, enabling “anti‑desktop” workflows impossible on mainstream OSes.

Why Linux Isn’t Dominant on the Desktop

  • Linked “Linux isn’t ready” lists spark debate: some say they’re overly negative; others agree that issues like hardware, QA, and networking are/were real, though much improved.
  • File sharing and remote desktop are compared: NFS/Samba seen as powerful but complex; Windows’ RDP and simple checkbox‑based sharing seen as more turnkey for typical users.
  • Historical view: GNOME 3 and KDE 4 upheavals coincided with Windows 7 and Snow Leopard, squandering a window where Linux might have surged.

Linux as an “App” and User Perception

  • A key barrier: most users won’t “install a distro”; they buy a computer-as-appliance. Linux missed the hardware+OS bundling model that let Windows/macOS dominate.
  • Now, all major vendors ship Linux environments (WSL, macOS tools, ChromeOS/Android) inside proprietary systems; this is praised as extremely convenient but also seen as a way to keep people from fully switching.

Overall Sentiment

  • No consensus “best” desktop: GNOME, KDE, XFCE, and tiling WMs all have strong partisans and sharp critics.
  • Broad agreement that Linux desktops are quite good in 2025 for those who choose them, but that diversity, culture, and history made mass‑market “year of the Linux desktop” unlikely.

Return of wolves to Yellowstone has led to a surge in aspen trees

Impact of Wolf Reintroduction on Yellowstone Ecosystem

  • Many commenters argue wolves had a strong indirect impact via trophic cascades:

    • Wolves reduce elk numbers and change elk behavior (less loitering near streams), which allows aspen, willow, and cottonwood to regenerate.
    • Regrowing riparian vegetation stabilizes banks, cools water, supports beavers, increases bird habitat, and benefits fish.
    • Some point out Yellowstone elk dropped from ~18,000 to ~2,000 after wolf reintroduction, calling this a clear driver of change.
  • Others note that human hunting, bears, cougars, bison, and hydrology also affect elk and vegetation; wolves are one factor in a complex system, not a magic switch.

Scientific Debate and Media Narratives

  • Several comments emphasize that “trophic cascades” are well-established in ecology, but details in Yellowstone remain contested.
  • Links are shared to work that:
    • Challenges the oversimplified story that wolves alone “changed rivers.”
    • Finds strong willow growth where beaver dams and water are restored, even with browsing, suggesting multiple drivers.
  • Some criticize popular media for repeating a neat wolf-story beyond what data justifies; others say even the more skeptical studies still show net ecological gains and increased complexity.

Human vs. Nonhuman Priorities

  • Philosophical split over what “restoring” an ecosystem means:
    • One camp: use pre–large-scale human disturbance (or pre-colonial) as a reference; aim for higher biodiversity, biomass, and resilience.
    • Another camp: there is no single “correct” state; we are imposing human values (e.g., liking aspens more than elk, wolves more than ranching).
  • Debate over whether biodiversity and “ecosystem health” are objective, or value-laden but still useful targets.

Local Costs, Policy, and Conflict

  • Ranchers losing livestock to wolves are reported to be angry; others reply that:
    • This is a trade-off between private economic convenience and common ecological goods.
    • Tools exist: compensation, better herding, dogs, fencing.
  • Mention of aggressive wolf-killing proposals in Montana (higher quotas, trapping), framed by some as political rather than scientific.
  • Safety concerns surface (risk to hikers), but others note many human-killing species are tolerated; the policy question is framed as cost–benefit, not zero risk.

Apple's Liquid Glass: When Aesthetics Beat Function

Form vs Function in UI

  • Many see “Liquid Glass” as aesthetics trumping usability: decorative translucency, rounded corners and gloss for a work tool where clarity should dominate.
  • Others argue a bit of frivolous design is fine in life, but not when it impairs a core tool’s readability and precision.
  • A minority says minimal, “empty canvas” UIs are desirable for focus, but even they want clear affordances and predictable controls.

Readability, Accessibility, and Hidden Controls

  • Widespread concern about poor contrast, blurred backgrounds, and hard‑to‑read text, especially on lock screens, nav bars, and notifications.
  • Accessibility implications (low vision, contrast requirements) are repeatedly flagged; some find iOS 26 betas “sluggish and hard to read.”
  • Broader complaint: platforms are “ashamed” of visible UI, shoving actions into “…” menus and hidden gestures, harming discoverability and adding extra taps.

Performance, Battery, and Energy Use

  • Some worry about wasted GPU cycles and battery for non‑functional shaders and large radii; others counter that the energy cost per device is trivial.
  • Disagreement over whether beta slowness/heat is just normal pre‑optimization or a preview of deliberate performance degradation on older devices.

AR/VR Justification and Cross‑Platform Unification

  • Several say Liquid Glass might make sense in spatial/AR contexts, but looks wrong on phones and desktops; others dispute that it’s even good for AR (real‑world signage isn’t translucent).
  • Many see this as part of a larger Apple strategy to unify iOS, macOS, iPadOS, and visionOS aesthetics, even if that worsens non‑AR use cases. Some question who actually wants this convergence.

Historical Parallels and Design Philosophy

  • Comparisons to Windows Vista’s Aero and Apple’s own Aqua and iOS 7: transparency phases that were later toned down for usability.
  • Deep disagreement over iOS 7: some viewed it as overdue simplification; others as a massive regression that destroyed affordances and information density—a fear now rekindled.

Corporate Incentives, Betas, and User Response

  • Competing theories: panic redesign to distract from weak Apple Intelligence, top‑down “Vision™” from leadership, or performance‑review/branding pressures demanding visible change.
  • Some say “it’s only a beta” and will be refined; others note multiple betas and the polished marketing framing, arguing criticism now is necessary course‑correction.
  • Anecdotes suggest non‑enthusiast younger users find the effect “cool,” while many power users talk about deferring upgrades or even platform‑switching.

Cerebras launches Qwen3-235B, achieving 1.5k tokens per second

Model, quantization & context confusion

  • Thread clarifies this is mainly an infrastructure / serving milestone, not a brand-new model architecture.
  • Uncertainty over whether Cerebras is serving Qwen3-235B quantized; past statements suggested they do not quantize, unlike some competitors, but nothing definitive is provided here.
  • Multiple people are confused by overlapping Qwen model variants (235B, coder/405B, “no-reasoning” vs reasoning, A22B, etc.).
  • Context length is messy: base model has ~32K native context; Cerebras advertises 131K via scaling methods (e.g. RoPE/YaRN). PR, tweets, OpenRouter and pricing docs appear inconsistent (32K, 40K, 64K, 131K), and free vs paid tiers differ.
  • One commenter notes theoretical 262K / 2M-token limits with aggressive scaling and accuses Cerebras of not serving the true max context.

Speed, use cases & coding agents

  • 1,000–1,500 tokens/s is seen as transformative for agent loops, code iteration and “time compression.” Many want the newer Qwen3-Coder hosted at similar speeds.
  • Some report API incompatibilities with existing agents (tool-call formatting, non-OpenAI-compliant behavior) making integration harder than with other providers.
  • There’s debate on deliberate “thinking” tokens: extra reasoning could improve performance, but also tends to relax constraints and derail tasks.
  • People explore using a fast model behind the scenes for context compaction for other LLMs, but say good production implementations are still rare.

Hardware architecture, economics & energy

  • Large subthread debates whether a 235B model with 131K context can realistically be run from SRAM alone; initial back-of-envelope numbers (tens of wafers, >$100M) are later challenged.
  • Others explain Cerebras uses large on-chip SRAM plus external memory (MemoryX), sparse weights, and streaming; SRAM is working memory, not total parameter store.
  • There’s contention over actual wafer/system pricing, profitability at current API rates, and whether this is effectively VC-subsidized.
  • Energy use per query is asked about but remains unanswered; only rough system TDP guesses are mentioned.

Model quality, censorship & competition

  • Early anecdotal feedback: very fast but not yet matching top-tier models for creative writing or coding; some find outputs repetitive or “over-deterministic.”
  • Qwen is praised as one of the strongest open-weight families, but described as heavily censored on sensitive topics (e.g., events in China), similar in spirit to other models’ safety filters.
  • Many see a fast Qwen3-Coder on Cerebras as a potential cheaper, faster rival to leading proprietary models, especially for IDE-integrated coding.

Tooling, workflows & broader implications

  • Users share setups for routing tools (Claude Code, Aider, IDEs) through proxies like OpenRouter or litellm to hit Cerebras endpoints; reports are mixed but generally enthusiastic about speed.
  • Some think near-instant LLMs will shift development toward highly interactive IDE workflows; others foresee spawning many parallel agent branches and post-hoc review instead.
  • There’s speculation that if LLMs get this fast widely, compiler performance, inference hardware design, and even number formats could become new optimization frontiers.

Lumo: Privacy-first AI assistant

Feature set, UX, and accessibility

  • Early complaints: no dark mode, seemingly English-only, and paywalled “Pro” tier despite “Unlimited” plans.
  • Other users report UI localization and working conversations in several languages (French, German, etc.).
  • Dark theme is framed not just as aesthetics but as an accessibility requirement for people with eye conditions. Some suggest using browser extensions as a workaround.
  • Lumo is not an “agent” (can’t act across services), so assistant-style scenarios like scheduling are seen as unrealistic expectations by some.

Model choice and quality

  • Lumo runs several open-source models (Nemo, OpenHands 32B, OLMO 2 32B, Mistral Small 3) on Proton-controlled servers.
  • Some see this as underpowered versus state-of-the-art (Claude 3.5, DeepSeek V3/R1, Qwen 235B, etc.) and describe answers as weaker than mainstream models or even local setups.
  • Others argue there is clear demand for a privacy-first assistant, especially for enterprises unwilling to trust Copilot/OpenAI with internal data.

Privacy model, jurisdiction, and trust

  • Proton emphasizes “servers we control” and no third-party model vendors; contrasted to Kagi, which uses external LLM providers.
  • Comparisons to Apple’s Private Cloud Compute: some say Apple’s design and auditability are more rigorous; others dismiss Apple as “privacy theater.”
  • Proton’s move of infrastructure out of Switzerland due to proposed mass surveillance laws sparks debate: some claim jurisdictional protection was always oversold; others see it as a serious privacy signal.
  • Skeptics note Proton has previously complied with court orders (e.g., IP data in Proton Mail cases) and that “no logs” and “trust us” are inherently hard to verify.

Open source and transparency confusion

  • Marketing text claims Lumo’s code is “fully open source,” but commenters cannot find any repository; some call this “openwashing.”
  • One user asked Lumo itself and got a (likely hallucinated) answer that Lumo is proprietary while its models are open source.
  • The wording on Proton pages appears to have changed, increasing confusion about what, if anything, is actually open source.

Censorship and content filtering

  • Reports that Lumo initially refuses to answer about Tiananmen Square as a “sensitive political topic,” citing local-law compliance.
  • Other users get full historical answers after pushing back or disabling web search, suggesting inconsistent behavior, possibly across models or sessions.
  • Commenters highlight the broader problem of opaque, shifting filters in LLMs and the difficulty for users who can’t detect omissions or hallucinations.

Product strategy and ecosystem concerns

  • Many long-time Proton users feel core products (Drive, Docs, Sheets-like tools, VPN, Linux clients, Standard Notes integration) remain half-baked while resources go into AI.
  • Others counter that AI assistants have huge demand (ChatGPT-like usage) and Proton just needs a profitable niche, not market domination.
  • Mixed sentiment: some are pleased a privacy-focused AI exists and plan to use it; others intend to ignore it until it matches mainstream models and Proton stabilizes its existing suite.

Open Sauce is a confoundingly brilliant Bay Area event

Overall impressions of Open Sauce

  • Many attendees describe the event as “confoundingly brilliant,” fun, and energizing: lots of hands‑on exhibits, weird side projects, battlebots, rockets, retro tech, and student robotics.
  • A big part of the appeal is talking directly to makers—often non‑famous hobbyists or small teams—who are eager to explain their builds in depth.
  • Others found it “just ok” or disappointing: too gimmicky, awkward social interactions, poor logistics (no printed agenda, weak mobile internet, hot/poorly ventilated halls), and panels that felt unfocused.

Panels, YouTubers, and event identity

  • Strong split between people who came for creators vs. those who came for engineering:
    • Fans enjoy seeing YouTubers in their chaotic, self‑deprecating style; panels are treated more as live entertainment than serious Q&A.
    • Critics expected more structured, informative panels and were frustrated that moderators dominated and very few kids’ questions were taken despite long lines.
  • Several commenters argue the conference feels centered around a specific creator and YouTuber culture, with the maker floor feeling like a “side show.”
  • Others respond that it’s explicitly pitched as a creator‑driven event (a kind of Maker Faire + VidCon), so expecting a polished, traditional conference is a mismatch.

Comparison with Maker Faire

  • Early Maker Faire is remembered as a mix of Burning Man–style art and independent makers, later overrun by big corporate booths before going bankrupt.
  • Open Sauce is seen as more creator‑ and indie‑maker‑focused, with sponsor booths intentionally kept smaller—though some feel 2025 tilted more toward sponsors and fewer “cool experiences.”
  • Several note that both events face the same core challenge: covering large fixed costs without letting sponsors or commercialization dominate.

Maker movement, kids, and careers

  • One teacher worries the maker/YouTube ecosystem nudges kids toward “content creator” aspirations rather than serious engineering careers, contributing to perceived engineer shortages.
  • Many push back:
    • Not every hobby must become a career; maker interests are valuable even as pure play.
    • Tinkering can be a gateway to engineering, programming, or adjacent fields, often through indirect, non‑linear life paths.
    • The real problems cited include social media attention incentives, “infotainment” expectations, underfunded education, and broader labor‑market/demographic issues, not the maker movement itself.

Openness, commercialization, and funding

  • Some are disappointed that “Open Sauce” doesn’t more strongly emphasize open‑source hardware/software and instead includes proprietary or corporate tech.
  • Others respond that the name is misleading if you infer “pure open source” from it; the event’s actual mission is broader community, education, and creator culture.
  • Repeated concern about long‑term financial sustainability: current runs reportedly lose money, relying on tickets, creator‑run subscription platforms, and modest sponsors—raising fears of either collapse (like Maker Faire) or creeping corporatization.

Other discussion threads

  • Debate over private equity buying popular science/engineering YouTube channels; some see it as worrying, others treat it as just another form of sponsorship.
  • NASA’s use of an attendee‑photographer’s ISS images spurs enthusiasm for releasing RAW files so the public can reprocess them.
  • Several note strong kid participation in soldering and badge‑making; others say the event skews older and ticket prices plus some safety concerns may limit younger attendance.

Has Brazil Invented the Future of Money?

Scope of Pix vs “Future of Money”

  • Several commenters argue Pix is a payment rail, not “new money”: it moves the same fiat currency, just faster and cheaper.
  • Confusion over why this implies anything about central bank digital currencies (CBDCs) or crypto; critics see marginal transaction-cost improvements, not a monetary revolution.
  • Others counter that the big change is ubiquity, speed, and extremely low friction in everyday life — Pix has become “liquid cash” used for everything from tips to buying property.

Comparisons to Existing Systems

  • Many note that similar instant, cheap bank transfers already exist: SEPA Instant / IBAN in Europe, UPI (India), Faster Payments (UK), PayNow (Singapore), PayID/Osko (Australia), Vipps/MobilePay (Nordics), etc.
  • Debate over how comparable these are:
    • Some say they already cover C2B/B2C/B2B and business use cases.
    • Others insist Pix is different because: enforced universal adoption, QR codes and aliases (phone/email/ID), free P2P by mandate, deep integration into e‑commerce, and use by the unbanked or lightly banked.
  • Commenters emphasize that in Brazil Pix has displaced cash and cards for day‑to‑day P2P and small business payments more than SEPA-type systems have in Europe.

Security, Fraud, and Privacy

  • Recent major fraud incident via a contractor’s compromised credentials shakes confidence; dispute over whether this reveals opacity or is just a third‑party failure using a sound core system.
  • Significant privacy concerns: some officials reportedly access Pix transaction data without court orders; critics tie this to a broader culture of acceptance of state surveillance (e.g., CPF).
  • Violent crime angle: kidnappings and coerced Pix transfers are described as a serious problem, with banks adding limits and safeguards; insurance products have emerged for forced transfers.
  • Additional fraud vectors: QR-code substitution leading to payments to attackers.

Crypto, CBDCs, and Trust Models

  • Several point out that Pix (and similar systems) already achieve what crypto promised—low costs and financial inclusion—without blockchains.
  • Core distinction stressed: crypto can behave like digital cash (more censorship-resistant, wallet-based), while Pix/CBDCs remain fully centralized and easily controllable.
  • Some see CBDCs or “digital euro” as a public, low-fee alternative to card networks and banks; others warn they will inevitably accumulate fees or be politicized.

Power, Surveillance, and Civil Liberties

  • Strong worry that CBDCs plus state-run rails concentrate too much power: easy mass surveillance, account freezes, or political punishment.
  • Examples cited: freezing of protest-related accounts in Canada, political repression in Brazil and Germany; used to argue that any additional state control over payments is dangerous.
  • Others reply that the real issue is governance and rule of law, not the payment technology itself, and that private banks are also untrustworthy; a mixed public–private system with oversight is preferred by some.

Reactions to Krugman’s Framing

  • Some think the piece undersells existing non-US systems and overhypes Pix as “the future.”
  • Others criticize the article’s political tone (especially its attacks on US Republicans) as emotional rather than analytical about privacy and CBDCs.
  • A minority defend the informal, polemical style as appropriate for a popular newsletter and agree that crypto has largely failed as a payment medium.

Brave blocks Microsoft Recall by default

How Brave blocks Recall (and how Windows treats browsers)

  • Brave uses a Windows API (SetInputScope with a “private” scope) that is only available to apps registered as http/https protocol handlers (i.e., “browsers”).
  • It marks all Brave windows as “private,” so Recall doesn’t capture them, while normal screenshots and accessibility tools still work.
  • Signal, as a non‑browser, instead uses a DRM flag to block all screenshots, which stops Recall but also breaks legitimate screen capture and screen readers.
  • Commenters note that any app can in practice register as a browser by adding an http/https handler in the registry, though that makes it appear as a browser choice to users.
  • Separate docs describe enterprise/education‑only policies for centrally filtering which apps/websites Recall records; user‑side app filtering is available in all editions.

Perceived purpose and risks of Recall

  • Many ask who actually wants Recall; suggested answers include investors, “AI feature” checkboxes, surveillance‑oriented employers, and state agencies.
  • Some find the concept genuinely useful: an on‑device, searchable history of everything on screen (local documents, sites you forgot to bookmark, etc.), especially if it truly stays local.
  • Others argue similar utility already exists via file history, search tools, or third‑party products, without continuous screenshots.
  • Even with local, encrypted storage and opt‑in, people see Recall as a massive new attack surface and liken it to a visual keylogger.

Distrust of Microsoft and future changes

  • Strong skepticism that Microsoft will respect “local only” and “off by default” long‑term, given its history of telemetry expansion, OneDrive redirection, and pushing Bing/Copilot.
  • Some expect silent data exfiltration justified as “analytics” or model training, or enterprise policies that force Recall on workers.
  • Others point out that Recall is currently opt‑in, removable via “Windows features,” and further disable‑able by group policy (with bits removed).

Apps vs. OS: is blocking Recall meaningful?

  • One camp sees Brave/Signal’s anti‑Recall features as important, especially since Microsoft makes granular opt‑out hard for non‑browsers.
  • Another camp calls it performative marketing: since Recall is already opt‑in and configurable per app, they argue that if you don’t trust the OS toggle, you shouldn’t be using that OS at all.

OS choices and broader backlash

  • The thread is full of people vowing to stay on Windows 10, or move to Linux or macOS, citing Recall as yet another step in Windows becoming “surveillance adware.”
  • Counterpoints highlight Linux’s practical drawbacks (hardware/pro‑audio support, CAD, specific games, Office/OneNote/Quicken) and macOS’s own AI/cloud‑processing features.